Record summary
A quick snapshot of what this page covers.
Techniques11Attack methods connected to this risk.
Mitigations7Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain4. Malicious Actors & Misuse
Subdomain4.2 > Cyberattacks, weapon development or use, and mass harm
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryInformation Security
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
User Training
Business and Data UnderstandingData Preparation+4 more
Deepfake Detection
DeploymentMonitoring and Maintenance+2 more
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
Validate AI Model
ML Model EvaluationMonitoring and Maintenance
Code Signing
Deployment
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Source
Research source for this risk, when available.
Included resource
Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
